Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
Max CVSS
7.6
EPSS Score
29.20%
Published
2008-10-23
Updated
2018-10-11
Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).
Max CVSS
5.0
EPSS Score
2.33%
Published
2004-12-31
Updated
2018-10-19
Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.
Max CVSS
7.5
EPSS Score
1.74%
Published
2005-01-21
Updated
2018-10-19
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
Max CVSS
4.6
EPSS Score
0.32%
Published
2005-01-21
Updated
2018-10-19
GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.
Max CVSS
3.6
EPSS Score
0.04%
Published
2002-01-31
Updated
2017-10-10
5 vulnerabilities found